SonicOS 5.8: NetFlow Reporting

Size: px
Start display at page:

Download "SonicOS 5.8: NetFlow Reporting"

Transcription

1 SonicOS 5.8: NetFlow Reporting Document Scope Rapid growth of IP networks has created interest in new business applications and services. These new services have resulted in increases in demand for network bandwidth, performance, and predictable quality of service as well as VoIP, multimedia and security oriented network services. Simultaneously, the need has emerged for measurement technology to support this growth by efficiently providing the information required to record network and application resource utilization. NetFlow provides solutions for each of these challenges. This SonicOS feature module guide provides an overview of NetFlow benefits and includes technical overview of features, details about the NetFlow cache, export formats and NetFlow operation. This document also provides configuration and troubleshoot procedures and examples. This document contains the following sections: NetFlow Reporting Overview section on page 1 Administrator Prerequisites section on page 4 Configuring NetFlow Reporting Task List section on page 5 User Configuration Tasks section on page 12 Appendix section on page 19 NetFlow Reporting Overview This section provides an introduction to the NetFlow Reporting feature. After reading the NetFlow Reporting Overview section, you will be able to start configuring your SonicWALL security appliance network interface to enable NetFlow services. This section contains the following subsections: NetFlow Benefits section on page 2 What Is A Flow? section on page 2 NetFlow Export Version Formats section on page 3 NetFlow Export Packet Header Format section on page 3 Supported Interfaces, Encapsulations and Protocols section on page 3 NetFlow Collectors section on page 4 Supported Platforms section on page 4 Supported Standards section on page 4 SonicOS 5.8 NetFlow Reporting Feature Guide 1

2 NetFlow Reporting Overview NetFlow Benefits NetFlow traditionally enables several key customer applications including: Network Monitoring NetFlow data enables extensive near real time network monitoring capabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution. Application Monitoring and Profiling NetFlow data enables network managers to gain a detailed, time-based, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands. User Monitoring and Profiling NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations. Network Planning NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications. NetFlow will give you valuable information to reduce the cost of operating your network. Security Analysis NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents. NetFlow has two key components: (1) the NetFlow cache or data source which stores IP Flow information and (2) the NetFlow export or transport mechanism that sends NetFlow data to a network management collector for data reporting. What Is A Flow? A flow is identified as a unidirectional stream of packets between a given source and destination both defined by a network-layer IP address and transport-layer source and destination port numbers. Specifically, a flow is identified as the combination of the following seven key fields: Source IP address Destination IP address Source port number Destination port number Layer 3 protocol type Input logical interface (ifindex) These seven key fields define a unique flow. If a flow has one different field than another flow, then it is considered a new flow. A flow contains other accounting fields (such as the AS number in the NetFlow export Version 5 flow format) that depend on the version record format that you configure for export. Flows are processed in a NetFlow cache. 2

3 NetFlow Reporting Overview NetFlow Export Version Formats The NetFlow Export datagram consists of a header and a sequence of flow records. The header contains information such as sequence number, record count and sysuptime. The flow record contains flow information, for example IP addresses, ports, and routing information. For more information, see Appendix section on page 19 The Version 5 format is an enhancement that adds Border Gateway Protocol (BGP) autonomous system information and flow sequence numbers. The distinguishing feature of the NetFlow Version 9 format is that it is template based. Templates provide an extensible design to the record format, a feature that should allow future enhancements to NetFlow services without requiring concurrent changes to the basic flow-record format. Using templates with NetFlow Version 9 provides several key benefits: Almost any information can be exported from a router or switch including layer 2 through 7 information, routing information, IPv6, IPv4, multicast and MPLS information. This new information will allow new applications for flow data and new views of network behavior. Third-party business partners who produce applications that provide collector or display services for NetFlow will not be required to recompile their applications each time a new NetFlow export field is added. Instead, they may be able to use an external data file that documents the known template formats. New features can be added to NetFlow more quickly, without breaking current implementations. NetFlow is "future-proofed" against new or developing protocols, because the Version 9 format can be adapted to provide support for them and other non-flow based data measurements. NetFlow Export Packet Header Format In these versions, the datagram consists of a header and one or more flow records. The first field of the header contains the version number of the export datagram. Typically, a receiving application that accepts any of the format versions allocates a buffer large enough for the largest possible datagram from any of the format versions and then uses the header to determine how to interpret the datagram. The second field in the header contains the number of records in the datagram (indicating the number of expired flows represented by this datagram) and is used to index through the records. Datagram headers for NetFlow Export versions 5 and 9 also include a "sequence number" field used by NetFlow data consuming applications to check for lost datagrams. Supported Interfaces, Encapsulations and Protocols NetFlow supports IPv4 (and IPv4-encapsulated) routed traffic over a wide range of interface types and encapsulations. This includes Frame Relay, Asynchronous Transfer Mode, Inter-Switch Link, 802.1q, Multi-link Point to Point Protocol, General Routing Encapsulation, Layer 2 Tunneling Protocol, Multi-protocol Label Switching VPNs, and IP Sec Tunnels. NetFlow is supported per interface. NetFlow support for multicast exists on all SonicWALL platforms. NetFlow supports IPv6 environments in the release of SonicOS 5.8 and up. SonicOS 5.8 NetFlow Reporting Feature Guide 3

4 Administrator Prerequisites NetFlow Collectors SonicWALL NetFlow collector provides fast, scalable, and economical data collection from multiple NetFlow Export-enabled devices. The collector consumes flow datagrams from multiple NetFlow Export-enabled devices and performs data volume reduction through selective filtering and aggregation, performs bi-directional flow analysis and flow de-duplication. Supported Platforms This feature is supported only on the SonicOS 5.8 release. The SonicOS 5.8 release supports the following platforms: TZ series NSA series Supported Standards SonicOS 5.8 NetFlow Reporting is supported on the following NetFlow Export Formats: NetFlow Version 5 NetFlow Version 9 IPFIX (NetFlow Version 10) IPFIX with extensions Administrator Prerequisites NetFlow Activation and Deployment Information SonicWALL recommends careful planning of NetFlow deployment with NetFlow services activated on strategically located edge/aggregation routers which capture the data required for planning, monitoring and accounting applications. Key deployment considerations include the following: Understanding your application-driven data collection requirements: accounting applications may only require originating and terminating router flow information whereas monitoring applications may require a more comprehensive (data intensive) end-to-end view Understanding the impact of network topology and routing policy on flow collection strategy: for example, avoid collecting duplicate flows by activating NetFlow on key aggregation routers where traffic originates or terminates and not on backbone routers or intermediate routers which would provide duplicate views of the same flow information NetFlow can be implemented in the SonicOS management interface to understand the number of flow in the network and the impact on the router. NetFlow export can then be setup at a later date to complete the NetFlow deployment. NetFlow is in general an ingress measurement technology which should be deployed on appropriate interfaces on edge/aggregation or WAN access routers to gain a comprehensive view of originating and terminating traffic to meet customer needs for accounting, monitoring or network planning data. The key mechanism for enhancing NetFlow data volume manageability is careful planning of NetFlow deployment. NetFlow can be deployed incrementally (i.e. interface by interface) and strategically (i.e. on well chosen routers) instead of widespread deployment of NetFlow on every router in the network. 4

5 Configuring NetFlow Reporting Task List Configuring NetFlow Reporting Task List The Log > Flow Reporting screen allows you to view statistics based on Flow Reporting and Internal Reporting. From this screen, you can also configure settings for internal and external flow reporting and external flow reporting. Flow Reporting Statistics The Flow Reporting Statistics apply to all external flows. This section shows reports of the flows that are sent to the server, not collected, dropped, stored in and removed from the memory, reported and non reported to the server. This section also includes the number of NetFlow/IPFIX templates sent and general static flows reported. NetFlow/IPFIX Packets Sent Data Flows Enqueued Data Flows Dequeued Data Flows Dropped Data Flows Skipped Reporting General Flows Enqueued General Flows Dequeued General Flows Dropped Total number of IPFIX/NetFlow packets sent to the external collector. Total number of connection related flows that is collected so far. Total number of connection related flows that have been reported either to internal collectors or external collectors. Total number of collected connection related flows that failed to get reported. Total number of connection related flows that skipped reporting. This can happen when running in periodic mode where collected flows are more than configured value for reporting. Total number of all non-connection related flows that have been collected. Total number of all non-connection related flows that have been reported either to external collectors or internal collectors. Total number of all non-connection related flows dropped due to too many requests. SonicOS 5.8 NetFlow Reporting Feature Guide 5

6 Configuring NetFlow Reporting Task List NetFlow/IPFIX Templates Sent General Static Flows Reported Total number of templates that has been reported to the external collector. Total number of static non-connection related flows that have been reported. This includes lists of applications/viruses/spyware/intrusions/table-ma p/column-map/location map. App Flow Reporting Statistics The App Flow Reporting Statistics apply to all internal flows. Similar to the Flow Reporting Statistics, this section shows reports of the flows that are sent to the server, not collected, dropped, stored in and removed from the memory, reported and non reported to the server. This section also includes the number of static flows removed from the queue, internal errors, and the total number of flows within the internal database. Data Flows Enqueued Data Flows Dequeued Data Flows Dropped Data Flows Skipped Reporting General Flows Enqueued General Flows Dequeued General Flows Dropped General Static Flows Dequeued App Flow Collector Errors Total Flows in DB Total number of connection related flows that have been queued to internal collector. Total number of connection related flows that have been successfully inserted into the database. Total number of collected connection related flows that failed to get inserted into the database due to high connection rate. Total number of connection related flows that skipped reporting. Total number of all non-connection related flows in DB queue. Total number of all non-connection related flows in DB queue. Total number of all non-connection related flows failed to get inserted due to high rate. Total number of non-connection related static flows that have been successfully inserted into the DB. Total number of internal database errors. Total number of connection related flows in DB. 6

7 Configuring NetFlow Reporting Task List Settings The Settings section has configurable options for internal flow reporting, external flow reporting, and the IPFIX collector. You can also configure the settings for what is reported to an external controller. Enable Flow Reporting and Visualization This is a global checkbox that enables or disables the complete flow reporting feature. Selecting this checkbox enables flow reporting and visualization, which you can view on the Dashboard screen. When this is disabled, both internal and external flow reporting are also disabled. Report to App Flow Collector Selecting this checkbox enables the specified flows to be reported to a flow collector within the SonicWALL appliance. Note that this option is enabled by default and used for visualization. If disabled, the Flow Monitor and Real Time Monitor on the Dashboard will not display any flows. You may leave this option disabled if you choose to rely only on external reporting, rather than SonicWALL visualization. SonicOS 5.8 NetFlow Reporting Feature Guide 7

8 Configuring NetFlow Reporting Task List Report to EXTERNAL flow collector Selecting this checkbox enables the specified flows to be reported to an external flow collector. Some options include another SonicWALL appliance configured as a collector, a SonicWALL Linux collector, or a third party collector. Note that not all collectors will work with all modes of flow reporting. Enable INTERFACE Based Reporting Selecting this checkbox enables flow reporting based on the initiator or responder interface. This provides a way to control what flows are reported externally or internally. If enabled, the flows are verified against the per interface flow reporting configuration, located in the Network>Interface screen. If an interface has its flow reporting disabled, then flows associated with that interface are skipped. Enable Firewall-Rules Based Reporting Selecting this checkbox enables flow reporting based on already existing firewall rules. This is similar to interface-based reporting; the only difference is instead of checking per interface settings, the per firewall rule is selected. Every firewall rule has a checkbox to enable flow reporting. If a flow matching a firewall rule is to be reported, this enabled checkbox will force to verify if firewall rules have flow reporting enabled or not. This is an additional way to control which flows need to be reported. Note that this option is applicable to both internal and external flow reporting. External Flow Reporting Type If the Report to EXTERNAL Flow Collector option is selected, you must specify the flow reporting type from the provided list in the dropdown menu: NetFlow version-5, NetFlow version-9, IPFIX, or IPFIX with extensions. If the reporting type is set to Netflow versions 5, 9, or IPFIX, then any third-party collector can be used to show flows reported from the device. It uses standard data types as defined in IETF. If the reporting type is set to IPFIX with extensions, then the collectors that are SonicWALL flow aware can only be used. The following are recommended options for collectors: A second SonicWALL appliance, acting as an external collector An external Linux collector running the SonicWALL provided package 8

9 Configuring NetFlow Reporting Task List A third-party collector that is SonicWALL flow aware, such as Plixer Scrutinizer For Netflow versions and IPFIX reporting types, only connection related flows are reported per the standard. For IPFIX with extensions, connection related flows are reported with SonicWALL specific data type, as well as various other tables to correlate flows with Users, Applications, Viruses, VPN, and so on. External Collector s IP Address Specify the external collector s IP address. This IP address must be reachable from the SonicWALL firewall in order for the collector to generate flow reports. Source IP to Use for Collector on a VPN Tunnel If the external collector must be reached by a VPN tunnel, specify the source IP for the correct VPN policy. Note: Select Source IP from the local network specified in the VPN policy. If specified, Netflow/IPFIX flow packets will always take the VPN path. External Collector s UDP Port Number Specify the UDP port number that Netflow/IPFIX packets are being sent over. The default port is Send Templates at Regular Intervals Selecting this checkbox will enable the appliance to send Template flows at regular intervals. Netflow version-9 and IPFIX use templates that must be known to an external collector before sending data. Per IETF, a reporting device must be capable of sending templates at a regular interval to keep the collector in sync with the device. If the collector is not needed, you may disable it here. Note: This option is available with Netflow version-9, IPFIX, and IPFIX with extensions only. Send Static Flows for Following Tables Select the static mapping tables to be generated to a flow from the dropdown list. Values include: Applications, Viruses, Spyware, Intrusions, Location Maps, Services, Rating Maps, Table Maps, and Column Maps. Selecting the Send Static Flows at Regular Intervals checkbox enables the sending of these specified static flows. When running in IPFIX with extensions mode, SonicWALL reports multiple types of data to an external device in order to correlate User, VPN, Application, Virus, etc. In this mode, data is both static and dynamic. Static tables are needed once since they rarely change. Depending on the capability of the external collector, not all static tables are needed. You can select the tables needed in this section. Note: This option is available with IPFIX with extensions only. Send Dynamic Flows for Following Tables Select the dynamic mapping tables to be generated to a flow from the dropdown list. Values include: Connections, Users, URLs, URL Ratings, VPNs, Devices, SPAMs, Locations, and VoIPs. When running in IPFIX with extensions mode, SonicWALL reports multiple types of data to an external device in order to correlate User, VPN, Application, Virus, etc. In this mode, data is both static and dynamic. Static tables are needed once since they rarely change. Depending on the capability of the external collector, not all static tables are needed. You can select the tables needed in this section. Note: This option is available with IPFIX with extensions only. Include Following Additional Reports via IPFIX Select additional IPFIX reports to be generated to a flow. Select values from the dropdown list. Values include: Logs, Interface Stats, Core Utilization, and Memory Utilization. When running in IPFIX with extensions mode, SonicWALL is capable of reporting more data that is not related to connection and flows. These tables are grouped under this section (Additional Reports). Depending on the capability of the external collector, not all additional tables are needed. In this section, users can select tables that are needed. Note: This option is available with IPFIX with extensions only. SonicOS 5.8 NetFlow Reporting Feature Guide 9

10 Configuring NetFlow Reporting Task List Report Settings This section allows you to configure flow reporting settings, such as realtime, real time with bulk, or periodic reporting. Note that modifying this section does not have an effect on internal reporting settings. Flow Reporting Mode Select from the dropdown list to have your SonicWALL appliance generate Netflow or IPFIX packets in one of the following values: Realtime One flow record is sent per packet Realtime with bulk More than one flow record is sent per packet Periodic A report is sent at a regular interval Typically, the SonicWALL flow reporting subsystem receives flows and other table data asynchronously from other parts of the firewall. This section specifies how and when that data needs to be reported. Flow Reporting Period (in seconds) When Periodic is selected, specify the number of seconds to wait before reporting the collected flows. In this mode, SonicWALL collects all flows from the firewall and waits until the time is elapses. Once the time elapses, the flows are reported externally to the collector. Number of Flows Reported per Period When Periodic is selected, specify the number of flows to be reported within each period. If the SonicWALL appliance collects more flows than what is specified in this field, the first n will be collected and reported. For example, if 10 is the specified number of flows reported, but the SonicWALL collects 20, the first 10 will be reported. Report TOP-TALKERS only When Periodic is selected, select this checkbox to enable the SonicWALL to report flows with the maximum amount of traffic. Among the collected flows, the SonicWALL selects those based on traffic, then sends them in descending order. 10

11 Configuring NetFlow Reporting Task List Event Settings The Event Settings section allows you to configure the conditions under which a flow is reported. Note that this section only applies to Connection related flows. Report Flows on Connection OPEN Enable this to report flows when the Connection is open. This is typically when a connection is established. Report Flows on Threat Detection Enable this to report flows specific to threats. Upon detections of virus, intrusion, or spyware, the flow is reported again. Report Flows on Application Detection Enable this to report flows specific to applications. Upon performing a deep packet inspection, the SonicWALL appliance is able to detect if a flow is part of a certain application. Once identified, the flow is reported again. Report Flows on User Detection Enable this to report flows specific to users. The SonicWALL appliance associates flows to a user-based detection based on its login credentials. Once identified, the flow is reported again. Report Flows on VPN Tunnel Detection Enable this to report flows sent through the VPN tunnel. Once flows sent over the VPN tunnel are identified, the flow is reported again. Report Flows on Kilo BYTES exchanged Enable this to report flows based on a specific number of traffic, in kilobytes, is exchanged. This option is ideal for flows that are active for a long time and need to be monitored. Kilobytes exchanged When the above option is enabled, specify the number of kilobytes exchanged to be reported. Report Once When the Report Flows on Kilo BYTES exchanged option is enabled, enabling this option will send the report only once. Leave it unselected if you want reports sent periodically. Report Flows on Connection CLOSED Enable this to report flows when the Connection is closed. Report DROPPED Flows Enable this to report dropped flows. This applies to flows that are dropped due to firewall rules. Skip Reporting of STACK Flows (connections) Enable this to skip the reporting of STACK flows for connections. Note that all flows as a result of traffic initiated or terminated by the firewall itself are considered stack traffic. Include following URL types Select the type of URLS to be generated into a flow. Select values from the dropdown list. Values include: Gifs, Jpegs, Pngs, Js, Xmls, Jsons, Css, Htmls, Aspx, and Cms. Note: This option is applies to both App Flow (internal) and external reporting when used with IPFIX with extensions. SonicOS 5.8 NetFlow Reporting Feature Guide 11

12 User Configuration Tasks User Configuration Tasks Depending on the type of flows you are collecting, you will need to determine which type of reporting will work best with your setup and configuration. This section includes configuration examples for each supported NetFlow solution, as well as configuring a second appliance to act as a collector. NetFlow version 5 Configuration Procedures section on page 12 NetFlow version 9 Configuration Procedures section on page 13 IPFIX (NetFlow version 10) Configuration Procedures section on page 14 IPFIX with Extensions Configuration Procedures section on page 15 NetFlow version 5 Configuration Procedures To configure typical Netflow version 5 flow reporting, follow the steps listed below. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Select the checkbox to Enable flow reporting. Note that if this is disabled, both internal and external flow reporting are also disabled. Select the Report to EXTERNAL flow collector checkbox to enable flows to be reported to an external flow collector. Note that you may enable this option if you prefer to receive external flows, rather than the SonicWALL visualization. Remember, not all collectors will work with all modes of flow reporting. Enable INTERFACE based reporting by selecting the checkbox. Once enabled, the flows reported are based on the initiator or responder interface. Note that this step is optional. Enable Firewall-Rules Based Reporting by selecting the checkbox. Once enabled, the flows reported are based on already existing firewall rules. Note that this step is optional, but is required if flow reporting is done on selected interfaces. Select Netflow version-5 as the External Flow Reporting Type from the dropdown list if the Report to EXTERNAL flow collector option is selected. Next, specify the External Collector s IP address in the provided field. For the Source IP to Use for Collector on a VPN Tunnel, specify the source IP if the external collector must be reached by a VPN tunnel. Note that this step is optional. Step 7 Specify the External Collector s UDP port number in the provided field. The default port is

13 User Configuration Tasks Note The highlighted fields are the required fields for successful Netflow version 5 configuration. All other configurable fields are optional, as noted in the above steps. NetFlow version 9 Configuration Procedures To configure Netflow version 9 flow reporting, follow the steps listed below. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Select the checkbox to Enable flow reporting. Note that if this is disabled, both internal and external flow reporting are also disabled. Select the Report to EXTERNAL flow collector checkbox to enable flows to be reported to an external flow collector. Note that you may enable this option if you prefer to receive external flows, rather than the SonicWALL visualization. Remember, not all collectors will work with all modes of flow reporting. Enable INTERFACE based reporting by selecting the checkbox. Once enabled, the flows reported are based on the initiator or responder interface. Note that this step is optional. Enable Firewall-Rules Based Reporting by selecting the checkbox. Once enabled, the flows reported are based on already existing firewall rules. Note that this step is optional, but is required if flow reporting is done on selected interfaces. Select Netflow version-9 as the External Flow Reporting Type from the dropdown list if the Report to EXTERNAL flow collector option is selected. Next, specify the External Collector s IP address in the provided field. For the Source IP to Use for Collector on a VPN Tunnel, specify the source IP if the external collector must be reached by a VPN tunnel. Note that this step is optional. Step 7 Specify the External Collector s UDP port number in the provided field. The default port is Step 8 Enable the option to Send templates at regular intervals by selecting the checkbox. Note that Netflow version-9 uses templates that must be known to an external collector before sending data. After enabling this option, you can Generate ALL Templates by clicking the button in the topmost toolbar. Note The highlighted fields are the required fields for successful Netflow version 9 configuration. All other configurable fields are optional, as noted in the above steps. SonicOS 5.8 NetFlow Reporting Feature Guide 13

14 User Configuration Tasks IPFIX (NetFlow version 10) Configuration Procedures To configure IPFIX, or NetFlow version 10, flow reporting, follow the steps listed below. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Select the checkbox to Enable flow reporting. Note that if this is disabled, both internal and external flow reporting are also disabled. Select the Report to EXTERNAL flow collector checkbox to enable flows to be reported to an external flow collector. Note that you may enable this option if you prefer to receive external flows, rather than the SonicWALL visualization. Remember, not all collectors will work with all modes of flow reporting. Enable INTERFACE based reporting by selecting the checkbox. Once enabled, the flows reported are based on the initiator or responder interface. Note that this step is optional. Enable Firewall-Rules Based Reporting by selecting the checkbox. Once enabled, the flows reported are based on already existing firewall rules. Note that this step is optional, but is required if flow reporting is done on selected interfaces. Select IPFIX as the External Flow Reporting Type from the dropdown list if the Report to EXTERNAL flow collector option is selected. Next, specify the External Collector s IP address in the provided field. For the Source IP to Use for Collector on a VPN Tunnel, specify the source IP if the external collector must be reached by a VPN tunnel. Note that this step is optional. Step 7 Specify the External Collector s UDP port number in the provided field. The default port is Step 8 Enable the option to Send templates at regular intervals by selecting the checkbox. Note that Netflow version-9 uses templates that must be known to an external collector before sending data. After enabling this option, you can Generate ALL Templates by clicking the button in the topmost toolbar. Note The highlighted fields are the required fields for successful IPFIX configuration. All other configurable fields are optional, as noted in the above steps. 14

15 User Configuration Tasks IPFIX with Extensions Configuration Procedures To configure IPFIX with extensions flow reporting, follow the steps listed below. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Select the checkbox to Enable flow reporting. Note that if this is disabled, both internal and external flow reporting are also disabled. Select the Report to EXTERNAL flow collector checkbox to enable flows to be reported to an external flow collector. Note that you may enable this option if you prefer to receive external flows, rather than the SonicWALL visualization. Remember, not all collectors will work with all modes of flow reporting. Enable INTERFACE based reporting by selecting the checkbox. Once enabled, the flows reported are based on the initiator or responder interface. Enable Firewall-Rules Based Reporting by selecting the checkbox. Once enabled, the flows reported are based on already existing firewall rules. Select IPFIX with extensions as the External Flow Reporting Type from the dropdown list if the Report to EXTERNAL flow collector option is selected. Next, specify the External Collector s IP address in the provided field. For the Source IP to Use for Collector on a VPN Tunnel, specify the source IP if the external collector must be reached by a VPN tunnel. Step 7 Specify the External Collector s UDP port number in the provided field. The default port is Step 8 Step 9 Step 10 Enable the option to Send templates at regular intervals by selecting the checkbox. Note that Netflow version-9 uses templates that must be known to an external collector before sending data. After enabling this option, you can Generate ALL Templates by clicking the button in the topmost toolbar. Enable the option to Send static flows at regular intervals by selecting the checkbox. After enabling this option, you can Generate Static Flows by clicking the button in the topmost toolbar. Select the tables you wish to receive static flows for from the dropdown list. Step 11 Select the tables you wish to receive dynamic flows for from the dropdown list. SonicOS 5.8 NetFlow Reporting Feature Guide 15

16 User Configuration Tasks Step 12 Select any additional reports to be generated to a flow from the dropdown list. 16

17 User Configuration Tasks Configuring Report Settings After configuring the Settings section to what best suits your App Flow, External, or IPFIX collector configuration, continue through this section to specify Flow Reporting Settings. Refer to the Report Settings section on page 10 for more information about each setting. Step 1 Select the Flow reporting mode from the dropdown list. Note that Realtime with bulk is the default setting. Step 2 Step 3 Step 4 For Realtime or Realtime with bulk, continue to Configuring Event Settings section on page 17. For Periodic, continue to Step 2. Specify the Flow reporting period. This is the number of seconds the appliance will wait before reporting the collected amount of flows. The default value is 10 seconds. Next, specify the Number of flows reported per period. Select the Report TOP-TALKERS only checkbox to enable the SonicWALL appliance to report flows with the maximum amount of traffic. Configuring Event Settings After configuring the Report Settings, continue through this section to configure the conditions under which a flow is reported. Selecting a checkbox will enable the configuration. Refer to the Event Settings section on page 11 for more information about each setting. SonicOS 5.8 NetFlow Reporting Feature Guide 17

18 User Configuration Tasks Verifying Netflow with Extensions Configurations One external flow reporting option that works with Netflow with Extensions is the third-party collector called Plixer Scrutinizer. This collector displays a range of reporting and analysis that is both Netflow and SonicWALL flow aware. Note You will need an account with Plixer Scrutinizer. To verify your Netflow with Extensions reporting configurations, perform the following steps. Step 1 Step 2 Step 3 Step 4 Step 5 Navigate to the SonicWALL Log > Flow Reporting screen. Enable the Report to EXTERNAL flow collector option on the Settings section. Specify the External collector s IP address and respective UDP Port Number. Enable the option to Send templates at regular intervals. Enable the option to Send static flows at regular intervals. Select the tables you wish to receive static flows for from the provided dropdown list. Then, click Accept.. Note Step 6 Step 7 Step 8 Step 9 Currently, Scrutinizer supports Applications and Threats only. Future versions of Plixer will support the following Static Flows: Location Map, Services, Rating Map, Table Map, and Column Map. Next, navigate to the Network > Interfaces screen. Confirm that Flow Reporting is enabled per interface by clicking the Configure icon of the interface you are requesting data from. On the Advanced tab, select the checkbox to Enable flow reporting. Then, click OK. Login to Plixer Scrutinizer. The data displays within minutes. 18

19 Appendix Appendix The following appendix describes the various NetFlow tables. Also, this section describes in detail the IPFX with extensions tables that are exported when the SonicWALL is configured to report flows. This appendix includes the following sections: Static Tables section on page 19 Dynamic Tables section on page 19 Templates section on page 20 NetFlow version 5 section on page 21 NetFlow version 9 section on page 22 IPFIX (NetFlow version 10) section on page 22 IPFIX with Extensions section on page 23 Static Tables Static Tables are tables with data that does not change over time. However, this data is required to correlate with other tables. Static tables are usually reported at a specified interval, but may also be configured to send just once. The following is a list of Static IPFIX tables that may be exported: Table Layout Map This table reports SonicWALL s list of tables to be exported, including Table ID and Table Names. Column Map This table represents SonicWALL s list of columns to be reported with Name, Type Size, and IPFIX Standard Equivalents for each column of every table. Rating Map This table represents SonicWALL s list of Rating IDs and the Name of the Rating Type. Location Map This table represents SonicWALL s location map describing the list of countries and regions with their IDs. Applications Map This table reports all applications the SonicWALL appliance identifies, including various Attributes, Signature IDs, App IDs, Category Names, and Category IDs. Intrusions Map This table reports all intrusions detected by the SonicWALL appliance. Viruses Map This table reports all viruses detected by the SonicWALL appliance. Spyware Map This table reports all spyware detected by the SonicWALL appliance. Services Map This table represents SonicWALL s list of Services with Port Numbers, Protocol Type, Range of Port Numbers, and Names. Dynamic Tables Unlike Static tables, the data of Dynamic tables change over time and are sent repeatedly, based on the activity of the SonicWALL appliance. The columns of these tables grow over time, with the exception of a few tables containing statistics or utilization reports. The following is a list of Dynamic IPFIX tables that may be exported: Flow Table This table reports SonicWALL connections. The same flow tables can be reported multiple times by configuring triggers. Location This table reports the Locations and Domain Names of an IP address. Users This table reports users logging in to the SonicWALL appliance via LDAP/RADIUS, Local, or SSO. SonicOS 5.8 NetFlow Reporting Feature Guide 19

20 Appendix URLs This table reports URLs accessed through the SonicWALL appliance. Log This table reports all unfiltered logs generated by the SonicWALL appliance. Interface Statistics This table reports statistics for all interfaces including VLANs. The statistics include Interface ID, Interface Name, Interface IP, Interface MAC, Interface Status, Interface Speed, Interface Mode, Interface Counters, and Interface Rolling Average Rate. Core Utilization This table reports all Core utilization by percentage. Memory Utilization This table reports all Memory utilization (Free, Used, Used by DB) of the SonicWALL appliance. VoIP This table reports all VoIP/H323 calls through the SonicWALL appliance. SPAM This table reports all exchanges through the SPAM service. Connected Devices This table reports the list of all devices connected through the SonicWALL appliance, including the MAC addresses, IP addresses, Interface, and NETBIOS name of connected devices. VPN Tunnels This table reports all VPN tunnels established through the SonicWALL appliance. URL Rating This table reports Rating IDs for all URLs accessed through the SonicWALL appliance. Templates The following section shows examples of the type of Netflow template tables that are exported. You can perform a Diagnostic Report of your own Netflow Configuration by navigating to the System > Diagnostics screen, and click the Download Report button in the Tech Support Report section. 20

21 Appendix NetFlow version 5 The NetFlow version 5 datagram consists of a header and one or more flow records, using UDP to send export datagrams. The first field of the header contains the version number of the export datagram. The second field in the header contains the number of records in the datagram, which can be used to search through the records. Because NetFlow version 5 is a fixed datagram, no templates are available, and will follow the format of the tables listed below. NetFlow version 5 Header Format Bytes Contents Description 0-1 version NetFlow export format version number 2-3 count Number of flows exported in this packet (1-30) 4-7 SysUptime Current time in milliseconds since the export device booted 8-11 unix_secs Current count of seconds since 0000 UTC unix_nsecs Residual nanoseconds since 0000 UTC flow_sequence Sequence counter of total flows seen 20 engine_type Type of flow-switching engine 20 engine_id Slot number of the flow-switching engine sampling_interval First two bits hold the sampling mode; remaining 14 bits hold value of sampling interval NetFlow version 5 Flow Record Format Bytes Contents Description 0-3 srcaddr Source IP address 4-7 dstaddr Destination IP address 8-11 nexthop IP address of the next hop router input SNMP index of input interface output SNMP index of output interface dpkts Packets in the flow doctets Total number of Layer 3 bytes in the packets of the flow First SysUptime at start of flow Last SysUptime at the time the last packet of the flow was received srcport TCP/UDP source port number or equivalent dstport TCP/UDP destination port number or equivalent 36 pad1 Unused (zero) bytes 37 tcp_flags Cumulative OR of TCP flags 38 prot IP protocol type (for example, TCP=6; UDP=17) 39 tos IP type of service (ToS) src_as Autonomous system number of the source, either origin or peer dst_as Autonomous system number of the destination, either origin or peer 44 src_mask Source address prefix mask bits SonicOS 5.8 NetFlow Reporting Feature Guide 21

22 Appendix NetFlow version 9 Bytes Contents Description 45 dst_mask Destination address prefix mask bits pad2 Unused (zero) bytes An example of a NetFlow version 9 template is displayed below. The following table details the NetFlow version 9 Template FlowSet Field Descriptions. Field Name Template ID Name Number of Elements Total Length Field Type Field bytes Description The SonicWALL appliance generates templates with a unique ID based on FlowSet templates matching the type of NetFlow data being exported. The name of the NetFlow template. The amount of fields listed in the NetFlow template. The total length in bytes of all reported fields in the NetFlow template. The field type is a numeric value that represents the type of field. Note that values of the field type may be vendor specific. The length of the specific Field Type, in bytes. IPFIX (NetFlow version 10) An example of an IPFIX (NetFlow version 10) template. The following table details the IPFIX Template FlowSet Field Descriptions. Field Name Template ID Name Number of Elements Total Length Description The SonicWALL appliance generates templates with a unique ID based on FlowSet templates matching the type of NetFlow data being exported. The name of the NetFlow template. The amount of fields listed in the NetFlow template. The total length in bytes of all reported fields in the NetFlow template. 22

23 Appendix Field Name Field Type Field bytes Description The field type is a numeric value that represents the type of field. Note that values of the field type may be vendor specific. The length of the specific Field Type, in bytes. IPFIX with Extensions IPFIX with extensions exports templates that are a combination of NetFlow fields from the aforementioned versions and SonicWALL IDs. These flows contain several extensions, such as Enterprise-defined field types and Enterprise IDs. Note that the SonicWALL Specific Enterprise ID (EntID) is defined as The following Name Template is a standard for the IPFIX with extensions templates. The values specified are static and correlate to the Table Name of all the NetFlow exportable templates. SonicOS 5.8 NetFlow Reporting Feature Guide 23

24 Appendix The following template is an example of an IPFIX with extensions template. IPFIX Data Types The following tables define the values and what they represent in IPFIX Common Data column maps. IPFIX Extension Data Types 339 A byte unsigned character (uint 8) 340 Description string 341 Name string 342 Range begin uint Range end uint Semantics uint Units uint Number uint 32 IPFIX Zone Security Ty 0 WAN Zone 1 LAN Zone 2 DMZ Zone 3 HA Zone 24

25 Appendix 4 WLAN Zone 5 VPN Zone 6 Multicast Zone 7 Other Zone 8 SSLVPN Zone 9 Unknown Zone IPFIX User Types 0 Authenticated via Internal User Configuration 1 Authenticated via Remote (LDAP/RADIUS) 2 Authenticated via SSO IPFIX VPN Policy Types 0 Site to Site 1 Tunnel Interface IPFIX VPN Protocol Types 0 ESP 1 AH IPFIX VPN Encryption Types 2 ESP_DES 3 ESP_3DES 11 ESP_NULL 250 ALG_AES_ ALG_AES_ ALG_AES_192 IPFIX VPN Authentication Types 0 AH_NONE 2 AH_MD5 3 AH_SHA IPFIX Spam Types 0 NO SPAM 1 SPAM 2 Likely Spam 3 Phishing 4 Likely Phishing SonicOS 5.8 NetFlow Reporting Feature Guide 25

26 Appendix 5 Virus 6 Likely Virus VOIP Media Types 1 Voice 2 Video 3 Data VOIP Proto Types 1 H323 2 SIP 3 RTSP 4 Multicast App BWM Types 0 NONE 1 HIGH 2 MEDIUM 3 LOW App Risk Types 0 NONE 1 LOW 2 MEDIUM 3 HIGH 4 SEVERE App Tech Types 0 NONE 1 Application 2 Network Infrastructure 3 Browser App Attribute Bit Mask 0 x 0 NONE 0 x 1 Evasive 0 x 2 Malware Carrying 0 x 4 File Transfer 26

27 Appendix 0 x 8 Known Vulnerabilities 0 x 10 Prone to misuse App Content Flag 0 NONE 1 IS CONTENT IPFIX Templates The following are data tables from IPFIX Templates. IPFix Template ID = 257, Name = Flow IPFIX extn, Number of Elements = 39, Total Length = 160 EField = 1, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=time stamp EField = 2, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=flow identifier EField = 3, Field bytes = 6, EntId = 8741, type = mac address-48bits, name=initiator gw MAC EField = 4, Field bytes = 6, EntId = 8741, type = mac address-48bits, name=responder gw MAC EField = 5, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=initiator IP Addr EField = 6, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=responder IP Addr EField = 7, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=initiator GW-IP Addr EField = 8, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=responder GW-IP Addr EField = 9, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=initiator iface EField = 10, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=responder iface EField = 167, Field bytes = 8, EntId = 8741, type = unsigned int-64bits, name=init vpn spi out EField = 168, Field bytes = 8, EntId = 8741, type = unsigned int-64bits, name=resp vpn spi out EField = 11, Field bytes = 2, EntId = 8741, type = unsigned int-16bits, name=initiator port EField = 12, Field bytes = 2, EntId = 8741, type = unsigned int-16bits, name=responder port EField = 13, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=init to resp pkts EField = 14, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=init to resp octets EField = 15, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=resp to init pkts EField = 16, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=resp to init octets EField = 169, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=init to resp delta pkts EField = 170, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=init to resp delta octets EField = 171, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=resp to init delta pkts EField = 172, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=resp to init delta octets EField = 17, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=flow start time EField = 18, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=flow end time EField = 19, Field bytes = 2, EntId = 8741, type = unsigned int-16bits, name=internal flags EField = 20, Field bytes = 1, EntId = 8741, type = unsigned char-8bits, name=protocol type EField = 173, Field bytes = 1, EntId = 8741, type = unsigned char-8bits, name=flow block reason EField = 22, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=flow to application id EField = 23, Field bytes = 8, EntId = 8741, type = unsigned int-64bits, name=flow to user id EField = 25, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=flow to ips id EField = 26, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=flow to virus id EField = 27, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=flow to spyware id EField = 113, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=flow init pkt rate EField = 114, Field bytes = 4, EntId = 8741, type = unsigned int-32bits, name=flow resp pkt rate SonicOS 5.8 NetFlow Reporting Feature Guide 27

SonicOS 5.8: NetFlow Reporting

SonicOS 5.8: NetFlow Reporting SonicOS 5.8: NetFlow Reporting Document Scope Rapid growth of IP networks has created interest in new business applications and services. These new services have resulted in increases in demand for network

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Configuring NetFlow Data Export (NDE)

Configuring NetFlow Data Export (NDE) 49 CHAPTER Prerequisites for NDE, page 49-1 Restrictions for NDE, page 49-1 Information about NDE, page 49-2 Default Settings for NDE, page 49-11 How to Configure NDE, page 49-11 Note For complete syntax

More information

EMIST Network Traffic Digesting (NTD) Tool Manual (Version I)

EMIST Network Traffic Digesting (NTD) Tool Manual (Version I) EMIST Network Traffic Digesting (NTD) Tool Manual (Version I) J. Wang, D.J. Miller and G. Kesidis CSE & EE Depts, Penn State EMIST NTD Tool Manual (Version I) Page 1 of 7 Table of Contents 1. Overview...

More information

Appendix A Remote Network Monitoring

Appendix A Remote Network Monitoring Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the

More information

LogLogic Cisco NetFlow Log Configuration Guide

LogLogic Cisco NetFlow Log Configuration Guide LogLogic Cisco NetFlow Log Configuration Guide Document Release: March 2012 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 2.0, and LogLogic Software Release 5.1

More information

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B. ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow

More information

Cisco IOS NetFlow Version 9 Flow-Record Format

Cisco IOS NetFlow Version 9 Flow-Record Format White Paper Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: May 0 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their

More information

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to

More information

UltraFlow -Cisco Netflow tools-

UltraFlow -Cisco Netflow tools- UltraFlow UltraFlow is an application for collecting and analysing Cisco Netflow data. It is written in Python, wxpython, Matplotlib, SQLite and the Python based Twisted network programming framework.

More information

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview

More information

Cisco IOS NetFlow Version 9 Flow-Record Format

Cisco IOS NetFlow Version 9 Flow-Record Format Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: February 007 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to

More information

Packet Monitor in SonicOS 5.8

Packet Monitor in SonicOS 5.8 Packet Monitor in SonicOS 5.8 Document Contents This document contains the following sections: Packet Monitor Overview on page 1 Configuring Packet Monitor on page 5 Using Packet Monitor and Packet Mirror

More information

SonicOS 5.8.1: Configuring the Global Bandwidth Management Service

SonicOS 5.8.1: Configuring the Global Bandwidth Management Service SonicOS 5.8.1: Configuring the Global Bandwidth Management Service Document Scope This feature guide describes the global bandwidth management (BWM) feature available in SonicOS Enhanced 5.8.1.0. This

More information

Net-flow. PacNOG 6 Nadi, Fiji

Net-flow. PacNOG 6 Nadi, Fiji Net-flow PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools etc

More information

NetFlow v9 Export Format

NetFlow v9 Export Format NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new

More information

Introduction to Cisco IOS Flexible NetFlow

Introduction to Cisco IOS Flexible NetFlow Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity

More information

Firewall Defaults and Some Basic Rules

Firewall Defaults and Some Basic Rules Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified

More information

NetFlow Configuration Guide, Cisco IOS Release 15M&T

NetFlow Configuration Guide, Cisco IOS Release 15M&T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

NetFlow Configuration Guide, Cisco IOS Release 12.4

NetFlow Configuration Guide, Cisco IOS Release 12.4 NetFlow Configuration Guide, Cisco IOS Release 12.4 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Netflow Overview. PacNOG 6 Nadi, Fiji

Netflow Overview. PacNOG 6 Nadi, Fiji Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools

More information

http://www.cisco.com/en/us/products//hw/switches/ps4324/index.html http://www.cisco.com/en/us/products/ps6350/index.html

http://www.cisco.com/en/us/products//hw/switches/ps4324/index.html http://www.cisco.com/en/us/products/ps6350/index.html CHAPTER 54 Supervisor Engine 6-E and Catalyst 4900M chassis do not support Netflow; it is only supported on Supervisor Engine IV, Supervisor Engine V, Supervisor Engine V-10GE, or WS-F4531. This chapter

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Configuring NetFlow Secure Event Logging (NSEL)

Configuring NetFlow Secure Event Logging (NSEL) 73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter

More information

NetFlow-Lite offers network administrators and engineers the following capabilities:

NetFlow-Lite offers network administrators and engineers the following capabilities: Solution Overview Cisco NetFlow-Lite Introduction As networks become more complex and organizations enable more applications, traffic patterns become more diverse and unpredictable. Organizations require

More information

NetFlow/IPFIX Various Thoughts

NetFlow/IPFIX Various Thoughts NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application

More information

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues... SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues... 5 Release Purpose SonicOS 6.1.1.5 is a maintenance

More information

NetFlow: What is it, why and how to use it? Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

NetFlow: What is it, why and how to use it? Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o. NetFlow: What is it, why and how to use it?, milos.zekovic@soneco.rs Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow

More information

NetFlow Configuration Guide, Cisco IOS Release 12.2SR

NetFlow Configuration Guide, Cisco IOS Release 12.2SR NetFlow Configuration Guide, Cisco IOS Release 12.2SR Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance. SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Feature Information... 2 Known Issues... 2 Resolved Issues... 4 Release Purpose

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0 Abstract These Application Notes describe the steps for

More information

SonicOS Enhanced 5.7.0.2 Release Notes

SonicOS Enhanced 5.7.0.2 Release Notes SonicOS Contents Platform Compatibility... 1 Key Features... 2 Known Issues... 3 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... 11 Platform Compatibility

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

NetFlow FlowAnalyzer Overview

NetFlow FlowAnalyzer Overview CHAPTER 1 FlowAnalyzer Overview This chapter describes the FlowAnalyzer system and its components. This system is used to read, analyze, and display switching data collected by the FlowCollector application.

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004 Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7

More information

SonicWALL Security Dashboard

SonicWALL Security Dashboard Document Scope This document describes how to use the feature on a SonicWALL security appliance running SonicOS 3.8 firmware or later. This document contains the following sections: Overview section on

More information

Release Notes. Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 2 Troubleshooting...

Release Notes. Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 2 Troubleshooting... Global VPN Client SonicWALL Global VPN Client 4.7.3 Release Notes Contents Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 2 Troubleshooting... 4

More information

Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export

Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export Last Updated: November 28, 2011 This module contains the minimum amount of information about and instructions necessary for configuring

More information

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,

More information

Flow Analysis Versus Packet Analysis. What Should You Choose?

Flow Analysis Versus Packet Analysis. What Should You Choose? Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation

More information

Enabling NetFlow on Virtual Switches ESX Server 3.5

Enabling NetFlow on Virtual Switches ESX Server 3.5 Technical Note Enabling NetFlow on Virtual Switches ESX Server 3.5 NetFlow is a general networking tool with multiple uses, including network monitoring and profiling, billing, intrusion detection and

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com NetFlow Tracker Overview Mike McGrath x ccie CTO mike@crannog-software.com 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters

More information

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:

More information

Scalable Extraction, Aggregation, and Response to Network Intelligence

Scalable Extraction, Aggregation, and Response to Network Intelligence Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues

More information

How To Use Netflow On Cisco Ios V2.3.4.4 (V2.4) And V2 (V3.3) (V1.4).4.2.2) (Cisco V

How To Use Netflow On Cisco Ios V2.3.4.4 (V2.4) And V2 (V3.3) (V1.4).4.2.2) (Cisco V NetFlow Services and Applications Whitepaper Kevin Delgadillo, Cisco IOS Product Marketing Table of Contents 1.0 Introduction 2.0 NetFlow Definitions and Benefits 2.1 NetFlow Cache Management and Data

More information

Recommended QoS Configuration Settings for. Dell SonicWALL SOHO Router

Recommended QoS Configuration Settings for. Dell SonicWALL SOHO Router Recommended QoS Configuration Settings for Dell SonicWALL SOHO Router Recommended QoS Configuration Dell SonicWALL SOHO Contents Contents Introduction....................................... 3 Supported

More information

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues...

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues... SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues... 5 Release Purpose SonicOS 6.1.1.3 is a maintenance

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

How-To Configure NetFlow v5 & v9 on Cisco Routers

How-To Configure NetFlow v5 & v9 on Cisco Routers How-To Configure NetFlow v5 & v9 on Cisco Routers Share: Visibility into the network is an indispensable tool for network administrators. Network visibility can be achieved through daily troubleshooting,

More information

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway Fireware How To VPN How do I set up a manual branch office VPN tunnel? Introduction You use Branch Office VPN (BOVPN) with manual IPSec to make encrypted tunnels between a Firebox and a second IPSec-compliant

More information

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring

More information

Contents. Release Purpose. Platform Compatibility. SonicOS 5.8.4.0 TZ 105 / TZ 205 Series Release Notes. SonicOS

Contents. Release Purpose. Platform Compatibility. SonicOS 5.8.4.0 TZ 105 / TZ 205 Series Release Notes. SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Browser Support... 2 Enhancements in SonicOS 5.8.4.0... 2 Supported Features by Appliance Model... 3 Known Issues... 5 Resolved Issues...

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

How do I set up a branch office VPN tunnel with the Management Server?

How do I set up a branch office VPN tunnel with the Management Server? Fireware How To VPN How do I set up a branch office VPN tunnel with the Management Server? Introduction Using the WatchGuard Management Server, you can make fully authenticated and encrypted IPSec tunnels

More information

SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0

SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0 SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0 Document Scope This document describes the DHCP enhancements in SonicOS Enhanced 4.0, including DHCP server options and DHCP server persistence.

More information

WildFire Cloud File Analysis

WildFire Cloud File Analysis WildFire 6.1 Administrator s Guide WildFire Cloud File Analysis Palo Alto Networks WildFire Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America

More information

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information

More information

ERserver. iseries. Remote Access Services: PPP connections

ERserver. iseries. Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections Copyright International Business Machines Corporation 1998, 2002. All rights reserved.

More information

TechNote. Configuring SonicOS for Amazon VPC

TechNote. Configuring SonicOS for Amazon VPC Network Security SonicOS Contents Overview... 1 System or Network Requirements / Prerequisites... 3 Deployment Considerations... 3 Configuring Amazon VPC with a Policy-Based VPN... 4 Configuring Amazon

More information

Chapter 4 Virtual Private Networking

Chapter 4 Virtual Private Networking Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

Cisco Network Planning Solution 2.0 Cisco Network Planning Solution Service Provider 2.0

Cisco Network Planning Solution 2.0 Cisco Network Planning Solution Service Provider 2.0 Cisco Network Planning Solution 2.0 Cisco Network Planning Solution Service Provider 2.0 Cisco Network Planning Solution (NPS) and Cisco Network Planning Solution Service Provider (NPS-SP) help enterprises

More information

Release Notes. Contents. Release Purpose. Pre-Installation Recommendations. Platform Compatibility. Dell SonicWALL Global VPN Client 4.

Release Notes. Contents. Release Purpose. Pre-Installation Recommendations. Platform Compatibility. Dell SonicWALL Global VPN Client 4. Global VPN Client Dell SonicWALL Global VPN Client 4.9 Release Notes SonicOS Contents Release Purpose... 1 Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues...

More information

ExtraHop and AppDynamics Deployment Guide

ExtraHop and AppDynamics Deployment Guide ExtraHop and AppDynamics Deployment Guide This guide describes how to use ExtraHop and AppDynamics to provide real-time, per-user transaction tracing across the entire application delivery chain. ExtraHop

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Flow Analysis. Make A Right Policy for Your Network. GenieNRM Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do

More information

SonicWALL GMS Custom Reports

SonicWALL GMS Custom Reports SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview

More information

Wave SIP Trunk Configuration Guide FOR BROADVOX

Wave SIP Trunk Configuration Guide FOR BROADVOX Wave SIP Trunk Configuration Guide FOR BROADVOX Last updated 1/7/2014 Contents Overview... 1 Special Notes... 1 Before you begin... 1 Required SIP trunk provisioning and configuration information... 1

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

SonicOS Enhanced 4.0: NAT Load Balancing

SonicOS Enhanced 4.0: NAT Load Balancing SonicOS Enhanced 4.0: NAT Load Balancing This document describes how to configure the Network Address Translation (NAT) & Load Balancing (LB) features in SonicOS Enhanced 4.0. Feature Overview, page 1

More information

How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) ( You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL

More information

Network Agent Quick Start

Network Agent Quick Start Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense

More information

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i... Page 1 of 10 Question/Topic UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) in SonicOS Enhanced Answer/Article Article Applies To: SonicWALL Security

More information

NetFlow The De Facto Standard for Traffic Analytics

NetFlow The De Facto Standard for Traffic Analytics NetFlow The De Facto Standard for Traffic Analytics A Webinar on NetFlow and its uses in Enterprise Networks for Bandwidth and Traffic Analytics Don Thomas Jacob Technical Marketing Engineer ManageEngine

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

WhatsUpGold. v12.3.1. NetFlow Monitor User Guide

WhatsUpGold. v12.3.1. NetFlow Monitor User Guide WhatsUpGold v12.3.1 NetFlow Monitor User Guide Contents CHAPTER 1 WhatsUp Gold NetFlow Monitor Overview What is NetFlow?... 1 How does NetFlow Monitor work?... 2 Supported versions... 2 System requirements...

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

NetFlow Services and Applications

NetFlow Services and Applications WHITE PAPER NetFlow Services and Applications Introduction Rapid growth in Internet and intranet deployment and usage has created a major shift in both corporate and consumer computing paradigms. This

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

SonicWALL Global Management System Reporting Guide Standard Edition

SonicWALL Global Management System Reporting Guide Standard Edition SonicWALL Global Management System Reporting Guide Standard Edition Version 2.9.4 Copyright Information 2005 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described

More information

Chapter 5 Customizing Your Network Settings

Chapter 5 Customizing Your Network Settings Chapter 5 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax NEXT Wireless Router WNR834B, including LAN, WAN, and routing settings.

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information